Analysis
-
max time kernel
83s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:02
Static task
static1
Behavioral task
behavioral1
Sample
00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe
Resource
win10v2004-20230221-en
General
-
Target
00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe
-
Size
685KB
-
MD5
b3b0ef757790621e20c21c30fd4998b0
-
SHA1
fd2072b8868975dfdbfb517dea8d89693a070b8a
-
SHA256
00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636
-
SHA512
e35ea11ac8bb347ad151997e4b037d8db83da043a2f4c57de96f76105e567197ce8923426fb9cc90a15391afe0fabbc12837794d2f8e165f0719f12c84fa1e9a
-
SSDEEP
12288:rMrBy90cly0v7tF/kfqdIai8Ea+KrAKj5uAZ3ETwK0SulMjqyXD4Y:OyThWai8EqVlZcNYmOyMY
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8398.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8398.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/436-195-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-196-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-198-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-200-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-202-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-204-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-206-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-208-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-210-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-212-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-214-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-216-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-218-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-220-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-222-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-224-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-226-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline behavioral1/memory/436-228-0x00000000029D0000-0x0000000002A0E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3200 un904701.exe 1324 pro8398.exe 436 qu8273.exe 4796 si068735.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8398.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un904701.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un904701.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 808 1324 WerFault.exe 86 3644 436 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1324 pro8398.exe 1324 pro8398.exe 436 qu8273.exe 436 qu8273.exe 4796 si068735.exe 4796 si068735.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1324 pro8398.exe Token: SeDebugPrivilege 436 qu8273.exe Token: SeDebugPrivilege 4796 si068735.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3200 2012 00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe 85 PID 2012 wrote to memory of 3200 2012 00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe 85 PID 2012 wrote to memory of 3200 2012 00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe 85 PID 3200 wrote to memory of 1324 3200 un904701.exe 86 PID 3200 wrote to memory of 1324 3200 un904701.exe 86 PID 3200 wrote to memory of 1324 3200 un904701.exe 86 PID 3200 wrote to memory of 436 3200 un904701.exe 95 PID 3200 wrote to memory of 436 3200 un904701.exe 95 PID 3200 wrote to memory of 436 3200 un904701.exe 95 PID 2012 wrote to memory of 4796 2012 00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe 99 PID 2012 wrote to memory of 4796 2012 00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe 99 PID 2012 wrote to memory of 4796 2012 00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe"C:\Users\Admin\AppData\Local\Temp\00f7e28201e07e3d50532d801ced04af3861e5d49e29f01f31bee1cbe1993636.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904701.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904701.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8398.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 10804⤵
- Program crash
PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8273.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8273.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 13364⤵
- Program crash
PID:3644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si068735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si068735.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1324 -ip 13241⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 436 -ip 4361⤵PID:3672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD512df8e945ea69d5f53d96401fa1bbb0c
SHA184337e68447f2396ab9a30c146e01de90bbcabb7
SHA2563e578eab1add3179dd37a4b0ee6e3c98ddb9cb29736174d4d8cb1aac2f7a3aee
SHA512ad6719ac7e969951babfda4fc92eed5f0457a373d79117caa9565caffde6a14a7ac7488265180f836b69b07465a10844ea36f2ad87242343a18d3be2f0810f67
-
Filesize
175KB
MD512df8e945ea69d5f53d96401fa1bbb0c
SHA184337e68447f2396ab9a30c146e01de90bbcabb7
SHA2563e578eab1add3179dd37a4b0ee6e3c98ddb9cb29736174d4d8cb1aac2f7a3aee
SHA512ad6719ac7e969951babfda4fc92eed5f0457a373d79117caa9565caffde6a14a7ac7488265180f836b69b07465a10844ea36f2ad87242343a18d3be2f0810f67
-
Filesize
543KB
MD56fcc365d5ea793299b458120edf15891
SHA1bba217fe2f57396e6f10f1490b7113110af8a24f
SHA256cdf300df6c360a9db01f31569b19922f32fa43292eb768a928a85c32adfa3aba
SHA512fe521572135fed3e66ca37e265f695744eadaf6d0f76d9ecf70ce0929d37d609b354634c75f7e5e274655982a397479d558d90f45f6ff8a7ff6ddfdd8958cb58
-
Filesize
543KB
MD56fcc365d5ea793299b458120edf15891
SHA1bba217fe2f57396e6f10f1490b7113110af8a24f
SHA256cdf300df6c360a9db01f31569b19922f32fa43292eb768a928a85c32adfa3aba
SHA512fe521572135fed3e66ca37e265f695744eadaf6d0f76d9ecf70ce0929d37d609b354634c75f7e5e274655982a397479d558d90f45f6ff8a7ff6ddfdd8958cb58
-
Filesize
292KB
MD5101077e8ef248137de4ff56dd9cab889
SHA1c407135bb6221bfc9a16d666af498944713507ee
SHA2566873f68ddde3b22ed9abadb935310b769ccb4286552f3f4c3adebe7d5475f79b
SHA512837c4b016b97d065375c4e37983985982148f9f2fb76979fc7eb97a15962ecf341c515ea852aaa9a3dcefd94bc3b28993f31b7099d8c0a27717017b0fb0f020d
-
Filesize
292KB
MD5101077e8ef248137de4ff56dd9cab889
SHA1c407135bb6221bfc9a16d666af498944713507ee
SHA2566873f68ddde3b22ed9abadb935310b769ccb4286552f3f4c3adebe7d5475f79b
SHA512837c4b016b97d065375c4e37983985982148f9f2fb76979fc7eb97a15962ecf341c515ea852aaa9a3dcefd94bc3b28993f31b7099d8c0a27717017b0fb0f020d
-
Filesize
350KB
MD5a73d5977e4a447b1a3885cb1a52f458d
SHA15e7da7cd51bbe9ddf2886859353346538447318e
SHA2565bd9edf2934834d4892e966cfb27435219afc7e5e8c126e08c46e418cf1196b6
SHA5123d996ebe2ccf0c429e2925c8386f3a7f0d13f62f0ad71909d5b3a611081c63c45ea3b7b89d919a1a7cda1c47a02d1d365132c4acab56b8c3642e91ef659ca00b
-
Filesize
350KB
MD5a73d5977e4a447b1a3885cb1a52f458d
SHA15e7da7cd51bbe9ddf2886859353346538447318e
SHA2565bd9edf2934834d4892e966cfb27435219afc7e5e8c126e08c46e418cf1196b6
SHA5123d996ebe2ccf0c429e2925c8386f3a7f0d13f62f0ad71909d5b3a611081c63c45ea3b7b89d919a1a7cda1c47a02d1d365132c4acab56b8c3642e91ef659ca00b